This document summarizes information about cross-site scripting (XSS) and denial of service (DoS) attacks against web applications. It describes persistent and non-persistent XSS, how stored XSS works, and discusses the IE8 XSS filter and its flaws. It also outlines how HTTP TRACE methods can be abused and explains common DoS attack techniques like SYN flooding and ping flooding that aim to overload server resources and prevent legitimate access. The document provides references for further reading on web application vulnerabilities and exploits.